IEEE Transactions on Information Forensics and Security

Issue 9 • Sept. 2015

Filter Results

Displaying Results 1 - 25 of 27
  • Front Cover

    Publication Year: 2015, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (374 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security publication information

    Publication Year: 2015, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):1797 - 1798
    Request permission for commercial reuse | PDF file iconPDF (125 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):1799 - 1800
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • AMR Steganalysis Based on the Probability of Same Pulse Position

    Publication Year: 2015, Page(s):1801 - 1811
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2764 KB) | HTML iconHTML

    This paper presents a method for detection of adaptive multirate (AMR) audio steganography. AMR audio codec is an audio data compression scheme optimized for speech coding, and widely used in some mobile telecommunications system. The AMR audio steganography schemes are emerging recently and they embed secret messages by modifying the nonzero pulse positions which are determined by fixed codebook ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust Beamforming Design for Sum Secrecy Rate Optimization in MU-MISO Networks

    Publication Year: 2015, Page(s):1812 - 1823
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2718 KB) | HTML iconHTML

    This paper studies the beamforming design problem of a multiuser downlink network, assuming imperfect channel state information known to the base station. In this scenario, the base station is equipped with multiple antennas, and each user is wiretapped by a specific eavesdropper where each user or eavesdropper is equipped with one antenna. It is supposed that the base station employs transmit bea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Capacity Limits of Pseudorandom Channels in Deception Problems

    Publication Year: 2015, Page(s):1824 - 1834
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2313 KB) | HTML iconHTML

    Supraliminal channels were introduced in 1998 as a means to achieve public key exchange in the presence of an active warden. These channels have content visible to all principals-their content is not concealed or protected by a secret key-but are highly robust to an active warden. It is assumed that this high robustness allows the transmission of key exchange datagrams. In this paper, we provide a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiple-Access Relay Wiretap Channel

    Publication Year: 2015, Page(s):1835 - 1849
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (819 KB) | HTML iconHTML

    In this paper, we investigate the effects of an additional trusted relay node on the secrecy of multiple-access wiretap channel (MAC-WT) by considering the model of multiple-access relay wiretap channel (MARC-WT). More specifically, first, we investigate the discrete memoryless MARC-WT. Three inner bounds [with respect to decode-and-forward (DF), noise-and-forward (NF), and compress-and-forward (C... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cepstral Analysis for the Application of Echo-Based Audio Watermark Detection

    Publication Year: 2015, Page(s):1850 - 1861
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2196 KB) | HTML iconHTML

    Cepstral analysis is an important signal processing procedure for audio watermark detection in echo-based audio watermarking systems. However, with the use of two common versions, i.e., complex and real cepstra, this procedure is usually treated as a very standard routine. This paper starts from noting inappropriate cepstral analysis from existing works, and provides rigorous derivations to reveal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secrecy Analysis on Network Coding in Bidirectional Multibeam Satellite Communications

    Publication Year: 2015, Page(s):1862 - 1874
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2740 KB) | HTML iconHTML

    Network coding is an efficient means to improve the spectrum efficiency of satellite communications. However, its resilience to eavesdropping attacks is not well understood. This paper studies the confidentiality issue in a bidirectional satellite network consisting of two mobile users who want to exchange message via a multibeam satellite using the XOR network coding protocol. We aim to maximize ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Probabilistic Deformation Models for Challenging Periocular Image Verification

    Publication Year: 2015, Page(s):1875 - 1890
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6071 KB) | HTML iconHTML

    The periocular region as a biometric trait has recently gained considerable traction, especially under challenging scenarios where reliable iris information is not available for human authentication. In this paper, we consider the problem of one-to-one (1 : 1) matching of highly nonideal periocular images captured in-the-wild under unconstrained imaging conditions. Such images exhibit considerable... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information Spectrum Approach to Strong Converse Theorems for Degraded Wiretap Channels

    Publication Year: 2015, Page(s):1891 - 1904
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (609 KB) | HTML iconHTML

    We consider block codes for degraded wiretap channels in which the legitimate receiver decodes the message with an asymptotic error probability no larger than ε but the leakage to the eavesdropper vanishes. For discrete memoryless and Gaussian wiretap channels, we show that the maximum rate of transmission does not depend on ε ∈ [0, 1), i.e., such channels possess the partial ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Strategy of Clustering Modification Directions in Spatial Image Steganography

    Publication Year: 2015, Page(s):1905 - 1917
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5670 KB) | HTML iconHTML

    Most of the recently proposed steganographic schemes are based on minimizing an additive distortion function defined as the sum of embedding costs for individual pixels. In such an approach, mutual embedding impacts are often ignored. In this paper, we present an approach that can exploit the interactions among embedding changes in order to reduce the risk of detection by steganalysis. It employs ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Analysis on One-to-Many Order Preserving Encryption-Based Cloud Data Search

    Publication Year: 2015, Page(s):1918 - 1926
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1478 KB) | HTML iconHTML

    For ranked search in encrypted cloud data, order preserving encryption (OPE) is an efficient tool to encrypt relevance scores of the inverted index. When using deterministic OPE, the ciphertexts will reveal the distribution of relevance scores. Therefore, Wang et al. proposed a probabilistic OPE, called one-to-many OPE, for applications of searchable encryption, which can flatten the distribution ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SNR Maximization Hashing

    Publication Year: 2015, Page(s):1927 - 1938
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1829 KB) | HTML iconHTML

    We propose a novel robust hashing algorithm based on signal-to-noise ratio (SNR) maximization to learn compact binary codes, where the SNR metric is used to select a set of projection directions, and one hash bit is extracted from each projection direction. We first motivate this approach under a Gaussian model for the underlying signals, in which case maximizing SNR is equivalent to minimizing th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust Watermarking of Relational Databases With Ontology-Guided Distortion Control

    Publication Year: 2015, Page(s):1939 - 1952
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2936 KB) | HTML iconHTML

    In this paper, we present a new robust database watermarking scheme the originality of which stands on a semantic control of the data distortion and on the extension of quantization index modulation (QIM) to circular histograms of numerical attributes. The semantic distortion control of the embedding process we propose relies on the identification of existing semantic links in between values of at... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards

    Publication Year: 2015, Page(s):1953 - 1966
    Cited by:  Papers (40)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2795 KB) | HTML iconHTML Multimedia Media

    Recently, in 2014, He and Wang proposed a robust and efficient multi-server authentication scheme using biometrics-based smart card and elliptic curve cryptography (ECC). In this paper, we first analyze He-Wang's scheme and show that their scheme is vulnerable to a known session-specific temporary information attack and impersonation attack. In addition, we show that their scheme does not provide ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Asymptotics of Fingerprinting and Group Testing: Tight Bounds From Channel Capacities

    Publication Year: 2015, Page(s):1967 - 1980
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1100 KB) | HTML iconHTML

    In this paper, we consider the large-coalition asymptotics of various fingerprinting and group testing games, and derive explicit expressions for the capacities for each of these models. We do this both for simple (fast but suboptimal) and arbitrary, joint decoders (slow but optimal). For fingerprinting, we show that if the pirate strategy is known, the capacity often decreases linearly with the n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage

    Publication Year: 2015, Page(s):1981 - 1992
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1299 KB) | HTML iconHTML

    To date, the growth of electronic personal data leads to a trend that data owners prefer to remotely outsource their data to clouds for the enjoyment of the high-quality retrieval and storage service without worrying the burden of local data management and maintenance. However, secure share and search for the outsourced data is a formidable task, which may easily incur the leakage of sensitive per... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search

    Publication Year: 2015, Page(s):1993 - 2006
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2318 KB) | HTML iconHTML Multimedia Media

    Existing semantically secure public-key searchable encryption schemes take search time linear with the total number of the ciphertexts. This makes retrieval from large-scale databases prohibitive. To alleviate this problem, this paper proposes searchable public-key ciphertexts with hidden structures (SPCHS) for keyword search as fast as possible without sacrificing semantic security of the encrypt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Size of Source Space in a Secure MAC

    Publication Year: 2015, Page(s):2007 - 2015
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (359 KB) | HTML iconHTML

    A message authentication code (MAC) is (t, ε) secure if an attacker cannot forge a valid message with probability better than ε after adaptively obtaining t valid messages. For a fixed key space K, it is important for an MAC to support a source space S as large as possible, because this implies a bandwidth saving in practice. Hence, we study the possible size of S in an MAC through |... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Reversible Data Hiding Based on Multiple Histograms Modification

    Publication Year: 2015, Page(s):2016 - 2027
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2414 KB) | HTML iconHTML

    Prediction-error expansion (PEE) is the most successful reversible data hiding (RDH) technique, and existing PEE-based RDH methods are mainly based on the modification of one- or two-dimensional prediction-error histogram (PEH). The two-dimensional PEH-based methods perform generally better than those based on one-dimensional PEH; however, their performance is still unsatisfactory since the PEH mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blank page

    Publication Year: 2015, Page(s): B2028
    Request permission for commercial reuse | PDF file iconPDF (3 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security Edics

    Publication Year: 2015, Page(s): 2029
    Request permission for commercial reuse | PDF file iconPDF (26 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Forensics and Security information for authors

    Publication Year: 2015, Page(s):2030 - 2031
    Request permission for commercial reuse | PDF file iconPDF (139 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Mauro Barni
University of Siena, Italy